Single Sign-On (SSO) allows users to authenticate into FMX using their existing Active Directory credentials. This reduces password management overhead and improves security by centralizing authentication.FMX supports WS-Federation for organizations using on-premises Active Directory Federation Services (AD FS).Important:Organizations that do not use on-premises AD FS should instead configure SSO using Azure Active Directory (Microsoft Entra ID). This document applies only to on-prem AD FS environments.RequirementsBefore starting, confirm the following:An active FMX site (example: https://yourcompany.gofmx.com)On-premises Active DirectoryAD FS 2.0 or later installed and operationalAdministrative access to the AD FS Management consoleSupported ProtocolWS-FederationStep 1: Add FMX as a Relying Party TrustLog in to the AD FS server.Open AD FS Management.In the left navigation pane, expand Trust Relationships.Click Relying Party Trusts.In the right Actions pane, click Add Relying Party Trust….Step 2: Add Relying Party Trust WizardSelect Claims aware and click Start.Choose Import data about the relying party published online or on a local network.Enter the following FMX federation metadata URL:https://yourcompany.gofmx.com/federationmetadata/2007-06/federationmetadata.xml Replace yourcompany with your FMX hostname.Click Next and proceed through the wizard.When prompted for access control, select:Permit all users to access this relying partyCheck the option:Open the Edit Claim Rules dialog for this relying party trust when the wizard closesComplete the wizard.Step 3: Configure Claim RulesFMX requires specific user attributes to be sent in the authentication token. These are configured as Transform Claim Rules.Create a New Claim RuleIn the Edit Claim Rules window, click Add Rule….Select Send LDAP Attributes as Claims.Click Next.Configure LDAP Attribute MappingAttribute Store: Active DirectoryAdd the following mappings:Name Identifier (Required)LDAP Attribute: User-Principal-NameOutgoing Claim Type:Name IDOR http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierEmail Address (Required)LDAP Attribute: E-Mail-AddressesOutgoing Claim Type:E-Mail AddressOR http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressGiven Name (Required)LDAP Attribute: Given-NameOutgoing Claim Type:Given NameOR http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennameSurname (Required)LDAP Attribute: SurnameOutgoing Claim Type:SurnameOR http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameTelephone Number (Optional)LDAP Attribute: Telephone-NumberOutgoing Claim Type:http://schemas.xmlsoap.org/ws/2005/05/identity/claims/homephoneClick Finish.Click OK to save the claim rule.Step 4: Complete the Integration with FMXFMX must be able to retrieve your AD FS federation metadata to complete setup.Federation Metadata URLYour AD FS metadata is available at:https://<your-ad-fs-server>/FederationMetadata/2007-06/FederationMetadata.xml Provide Metadata to FMXRecommended: Provide FMX with the publicly accessible metadata URL.Alternative: If your AD FS server is internal-only, download the XML file and provide a copy to FMX Support.Using a URL allows FMX to automatically detect certificate updates and prevents authentication interruptions.TroubleshootingUsers Are Redirected to a Registration PageCause:Required attributes (email, given name, or surname) are missing from the SSO assertion.Resolution:Verify all required claims are configured.Confirm affected users have values populated in Active Directory.Authentication Fails or Login Stops Working SuddenlyCause:The AD FS token-signing certificate has expired.Resolution:If FMX was provided a metadata URL, no action is usually required — FMX will automatically retrieve the updated certificate.If FMX was provided a static metadata file, a new copy must be sent after certificate renewal.Users Receive an Access Denied ErrorCause:User does not meet AD FS access control rulesRelying party trust misconfigurationResolution:Confirm Permit all users to access this relying party is selectedReview AD FS event logs for claim issuance errorsNeed Help?Once configuration is complete, contact FMX Support or your Customer Success Manager and provide your AD FS federation metadata URL or file to finalize setup. Was this article helpful? 0 out of 0 found this helpful